An introduction to and demonstration of NextGen Endpoint

Join this webinar on Endpoint Security as we:
•View the NextGen Endpoint client
•Discuss the new architecture behind NextGen Endpoint
•Highlight important features that distinguish it from other endpoint solutions
•Walk through a live demonstration

McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides customers with the flexibility to deploy a web gateway in one of three ways: all on-premises, all in the cloud, or a combination of on-premises and cloud-based. This unique capability enables you to match your Web Gateway configuration with your unique business needs and adapt to changing business circumstances.

In this session, McAfee will discuss the hybrid web protection deployment model in detail and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific security challenges.

Microsoft Windows Server 2003 is scheduled for an official End of Support (EOS) in July 2015. In a recent survey*, 52% of Fortune 1000 IT Professionals still have 100 or more systems running Windows Server 2003 and only a quarter of respondents have a plan to upgrade. The consequence for customers is that Microsoft will not only discontinue technical support but also security patches.

Join us for this webcast to learn how can McAfee help you protect your investment into Microsoft Server 2003 beyond end of support in July 2015.

Enterprises are challenged by the demand for business growth, which in turn calls for new applications, IT systems and services. As the business environment is getting more complex it poses a risk for security. Is your network security solution capable of securing your business today and in the future? Have you considered how big role the firewall solution plays in your business and IT staff productivity, risk mitigation and infrastructure costs.

Protecting devices, data and networks from modern threats does not have to be complex and costly. Trust McAfee to help you deliver simple, powerful endpoint protection exclusively for your small to medium-size business.

As organizations consider moving email infrastructure to Office 365, is there a need to complement built-in security with additional solutions?

Join this session to learn how advanced threats are being delivered, and how McAfee uniquely extends critical protection to organizations using Office 365 for email. A free offer to run an assessment of your organization’s ability to detect phishing will also be provided.

Everyone knows computer downtime is unacceptable. The world runs on data and it needs it fast. But securing that growing data network is time-consuming, expensive and often inefficient. Security professionals are looking for answers that can provide high availability and scale as the business changes. And they want solutions that are both highly secure and not a drain on computing and bandwidth resources.

Threats have gone stealthy hiding behind normal enterprise activity and under mountains of log data. Join McAfee and Gartner’s SIEM veteran and research Vice President Anton Chuvakin as he uncovers details on using SIEM to unmask, understand and respond to threats.

Learn from industry experts insights on proven approaches to get real time visibility on enterprise risks and minimize the impact of a security breach.

SIEM solutions have been the go-to technology for compliance and event/log visibility but rarely provide the deep forensics necessary to actually improve the security posture of the enterprise. In a time when we are asked to do more with less (diminishing IT/security budgets, fewer FTE resources, reduced training), the Next-Generation SIEM needs to help bridge that gap, provide deeper analytics that elevates the discussion from Find (identifying security issues) to Fix (remediating threats).

With malware and crafty intrusion behaviors on the rise, we must change our thinking and realize that traditional approaches to security are falling short. In this webinar we’ll hear how to advances in intrusion inspection can drive your security organizations in new and exciting ways.

Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.

Join the webinar and learn from an DLP expert from Intel Security on best practices on implementing DLP in stages, including:
•Understand what data is leaving your organization
•Build and manage policies
•Simplify workflow
•How to automate remediation

Easy answer is the number of Firewalls required to protect your perimeter. The right answer is the number of firewalls required for all entry points – perimeter and internal. Why? Internal threats are often more dangerous than external. Now you must protect multiple segments of your enterprise network. The perimeter is just the start. Multiple internal locations may need protection in addition to branches, cloud services and data centers. And what about mobile devices, home offices and temporary office workers like auditors and consultants?

Join us for an informative review of where to put your firewall, IPS, VPN and other associated network security equipment.

Learn how next generation firewall technology can help you manage multiple security appliances across your enterprise.

The vast majority of cyber-attacks on business begin with a phishing email, tailored to deceive an unsuspecting employee into clicking on a link or attachment containing malware. Do you have a strategy to defend against these attacks? Does it involve stopping malware before it enters your network? In this webcast, we’ll discuss how advanced malware detection technologies can detect and eliminate advanced malware in-line with traffic, before it has a chance to deliver its payload and attempt to steal your sensitive information.

In this webinar:
• You will learn about the multiple infiltration mechanisms used by cybercriminals in phishing attacks
• You will see how advanced malware detection engines can detect these attacks
• You will walk away with an understanding of how advanced malware detection technologies fit into a connected security infrastructure

Don’t miss this webcast if you are responsible for the security of your organization’s sensitive information. We will cover the latest in advanced malware detection for a critical element of your security practice – email traffic – and how this technology fits into the larger picture of defence against malware.

Today’s flexible, scalable data center requires security that will not hinder the choices or options for growth. Providing security management, visibility and optimized protection across physical, virtual and cloud environments is a fundamental concern. McAfee provides two server security suites that fit the bill.

Learn about McAfee’s latest Server Security Suite, the version 3.5 release, which provides key improvements by delivering advancements in the following three key areas:
•Simplification of security management
•Greater visibility into security status for server workloads in the public cloud
•Improved protection and performance exhibited by the availability of the McAfee Agentless Firewall.

Advanced malware analysis solutions are gaining traction as viable options for enhancing current security defenses. The effectiveness of these solutions is determined not only by examination technologies and features but by the level of integration between existing security sensors – from network to endpoint - and the sandbox or analysis solution.